Prime Minister and Cabinet scolded for Gmail, Hotmail use

The Department of Prime Minister and Cabinet has vowed to block access to public Cloud-based email websites on work computers it administers, after the auditor-general found use of Gmail and Hotmail accounts by staff risked internal information.

An audit (PDF) of the Australian Office of Financial Management, ComSuper, Medicare Australia and the Department of the Prime Minister and Cabinet released this week found lax ICT security practices among all four agencies, including use of weak passwords and poor processes.

In particularly, the audit found staff at the Department of Prime Minister and Cabinet used unencrypted public Web-based email accounts on services like Gmail and Hotmail. Logs obtained by the Australian National Audit Office (ANAO) revealed some staff had used the accounts on a regular basis.

In its report, the audit office recommended the use of public accounts be blocked on agency ICT systems to prevent external attacks and information leaks. The department agreed it would block the services from 1 July in response to the report.

In its review of ICT security practices at other agencies, a password test applied by the office found all four agencies had weak passwords on IT administrator and service accounts.

“These accounts, which allow a high level of access across ICT systems, should use suitably complex password configurations to reduce the potential for inappropriate access,” read the audit.

The ANAO also discovered one agency lacked a documented process for reviewing Internet access logs, increasing the risk of exposing the agency to external intrusion.

Two agencies were using third party software applications with outdated patches.

“Patches should be applied accordingly, to better protect their security, especially given their known vulnerability to attack,” read the report.

Other recommendations included the use of content filtering to prevent access to inappropriate websites and using certification for internal network gateways.

“While each agency had appropriate certification for their main Gateways, two agencies were also using uncertified Gateways. The use of uncertified Gateways exposes the agencies to an increased risk of unauthorised access from outside the internal network,” read the report.

Overall, the ANAO found that the audited agencies were complying with ICT security requirements, however it recommended all agencies review the integrity of administrator account passwords.

The release of the audit follows a similar report conducted by the New South Wales auditor general ,Peter Achterstraat, in February 2010 into NSW state departments.

It found that while testing performed by experts found no major security flaws, several opportunities to improve electronic information security existed.

This included the government database access not being secured in Web applications, which would potentially leave databases open to SQL injection attacks and consequently data theft.

In addition, the failure to terminate remote access sessions, transmission of data between systems and remote applications in easily read and modifiable form, weak encryption methods, login credentials stored by the user’s Web browser, and out of date operating system software with known vulnerabilitys were also identified as areas where IT security could be improved.

Latest Videos

​Email fraud is nothing new, but online criminals have become ever more-effective at spoofing their identities to trick employees into sending them money. The Australian Centre for Cyber Security (ACSC) recorded losses of over $20M to business email compromise (BEC) attacks last year alone, up 230 percent over the previous year – and the full amount is certain to be much larger.​

No matter how robust your security, or how diligent your employees, network credentials are a free pass for cybercriminals. This is mostly because employees are relied upon for their own password management. And with more than 4.8 billion sets of stolen credentials said to be available online, odds are that at least a few of your employees’ user IDs and passwords are just waiting to be used by unscrupulous outsiders. Are you ready to stop them?

Cyber resilience will be particularly important as Australian organisations face increased pressure to quickly detect, respond to, and manage the repercussions of breaches in the wake of 2018’s Notifiable Data Breaches (NDB) scheme.

Copyright 2018 IDG Communications. ABN 14 001 592 650. All rights reserved. Reproduction in whole or in part in any form or medium without express written permission of IDG Communications is prohibited.